CN105553641A - Chaotic secure communication method and secure communication system - Google Patents

Chaotic secure communication method and secure communication system Download PDF

Info

Publication number
CN105553641A
CN105553641A CN201610073928.1A CN201610073928A CN105553641A CN 105553641 A CN105553641 A CN 105553641A CN 201610073928 A CN201610073928 A CN 201610073928A CN 105553641 A CN105553641 A CN 105553641A
Authority
CN
China
Prior art keywords
chaotic
signal
secure communication
mode
chaos
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610073928.1A
Other languages
Chinese (zh)
Other versions
CN105553641B (en
Inventor
辛建芳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Anhui Polytechnic University
Original Assignee
Anhui Polytechnic University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anhui Polytechnic University filed Critical Anhui Polytechnic University
Priority to CN201610073928.1A priority Critical patent/CN105553641B/en
Publication of CN105553641A publication Critical patent/CN105553641A/en
Application granted granted Critical
Publication of CN105553641B publication Critical patent/CN105553641B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/001Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention relates to the field of secure communication, and particularly relates to a secure communication method and a secure communication system based on chaos. The invention provides a chaotic key control secure communication method and a secure communication system thereof. A secure communication controller A and a secure communication controller B respectively comprise completely the same devices and connection relations thereof, namely comprising a high frequency ring oscillator, a sampling quantizer, a seed register, a cellular automaton, a synchronous communication device and a controller, the high frequency ring oscillator, the sampling quantizer, the seed register and the cellular automaton are electrically connected in sequence, the controller is electrically connected with the high frequency ring oscillator, the sampling quantizer, the cellular automaton and the synchronous communication device respectively, the controller is electrically connected with a digital signal waveform generator and n chaotic signal waveform generators respectively, the cellular automaton is in feedback connection with the high frequency ring oscillator, and the synchronous communication device of the secure communication controller A keeps a wired or wireless connection with the synchronous communication device of the secure communication controller B.

Description

A kind of Development of Chaotic Secure Communication Method and secret signalling
Technical field
The present invention relates to secure communication field, particularly a kind of secret communication method based on chaos and secret signalling.
Background technology
Since nineteen ninety, chaotic communication becomes a study hotspot that is international, home communications.The development of Control of Chaotic Synchronization theory, for chaos has established theoretical foundation in the application of the communications field.Utilizing synchronous chaos to carry out secure communication is the current large focus studied in the world.Proposing so far communicates with the synchronous chaos developed mainly is divided into: chaotic mask, chaotic parameter modulation, chaos shift keying and chaos spread spectrum.
Utilize chaos to carry out secure communication and mainly contain four kinds of modes: 1. chaotic mask; 2. chaos shift keying; 3. chaotic modulation; 4. chaos spread spectrum.They are all based on Chaotic Synchronous.The general principle of chaotic mask is that the information that will transmit and chaos pseudo noise additivity are modulated, and reaches the object hidden information, belongs to analog communication.Latter three kinds belong to digital communication, and chaos shift keying utilizes different chaotic signal to represent binary message.Chaotic modulation also claims wide range to launch, and basic thought is that an information signal is injected into transmitter, and change the dynamic characteristic of former chaos system thus, thus information signal is modulated.It has better antidecoding capability than chaos shift keying and chaotic mask.
From chaos system can realize synchronous after, utilize chaos and Chaotic Synchronous to realize study hotspot that secure communication has become private communication technology in recent years.Fundamentally, the general principle of chaotic mask is that the information that will transmit and chaos pseudo noise additivity are modulated, and reaches the object hidden information, belongs to analog communication.Chaos shift keying utilizes different chaotic signal to represent binary message, although belong to digital communication, because permutation and combination is very easily exhaustive, confidentiality is very low.Chaotic mask and chaos shift keying belong to first generation Chaotic secret communication technology, and security performance is very low, the large heavy discount of practicality, although they implement relatively simple, but reality substantially need not.
Summary of the invention
Bad in order to overcome chaotic communication confidentiality in prior art, the problem of secret signalling complex structure, secret weak effect, the invention provides a kind of chaos shift keying secret communication method and secret signalling thereof, concrete technical scheme is as follows:
A kind of Development of Chaotic Secure Communication Method, it is characterized in that, the method step comprises:
The transmitting terminal of step one, chaotic secret communication system and receiving terminal first time shake hands, and determine communication protocol, previously arranged signal power is P0;
The transmitting terminal of step 2, chaotic secret communication system and receiving terminal second handshake, determine the mode of operation of transmitting terminal and receiving terminal secure communication;
The transmitting terminal of step 3, chaotic secret communication system and receiving terminal third time shake hands, and determine the selection strategy of the mode of operation of transmitting terminal and receiving terminal secure communication;
Communication protocol, mode of operation and selection strategy that step 4, transmitting terminal are determined according to three-way handshake carry out scrambling coding to source signal, obtain scrambling coding signal;
Step 5, transmitting terminal adopt chaotic mask technology, select a powerful chaotic mask signal C00, its power is designated as PC00, ensure that the power of chaotic mask signal is greater than power 10 more than dB of chaos shift keying, namely, 10*lg (PC00/P0) >10dB, is then sent to receiving terminal by the radio-frequency apparatus of transmitting terminal;
Step 6, receiving terminal know the chaotic signal C00 for chaotic mask in advance by the Handshake Protocol before intercommunication, first this chaotic mask signal C00 is removed, then communication protocol, mode of operation and the selection strategy determined according to three-way handshake carry out reverse sync operation, the waveform of decoded security code signal, obtains the estimated signal of source signal.
Especially, the present invention further improves, and it is characterized in that:
The mode of operation of described step 2 comprises:
1) chaos shift keying mode of operation 1 is with chaotic signal CA and CB representative digit signal 1 and 0 respectively,
2) chaos shift keying mode of operation 2 is with chaotic signal CA and CB representative digit signal 0 and 1 respectively;
The selection strategy of the mode of operation of the secure communication of described step 3 is employing chaos signal generator T0, each time slot carries out certain operations to the output of chaos signal generator T0, described certain operations can be summation, also can be convolution, or be directly sample quantization, operation result round numbers, then carry out 2 systems and get remainder operation, remainder should be a numeral in 0 or 1, if remainder is 0, select chaos shift keying mode of operation 1 to communicate, if remainder is 1, select chaos shift keying mode of operation 2 to communicate.
Especially, the present invention further improves, and it is characterized in that:
Described in described step 2, communication plan comprises:
1) chaos shift keying mode of operation 1 is with chaotic signal CA1 and CB2 representative digit signal 1 and 0 respectively,
2) chaos shift keying mode of operation 2 is with chaotic signal CA2 and CB2 representative digit signal 1 and 0 respectively,
3) chaos shift keying mode of operation i is with chaotic signal CAi and CBi representative digit signal 1 and 0, wherein i=1,2 respectively ..., n;
The selection strategy of the mode of operation of the secure communication of described step 3 is employing chaos signal generator T0, each time slot carries out certain operations to the output of chaos signal generator T0, described certain operations can be summation, also can be convolution, or be directly sample quantization, operation result round numbers, then carry out n system and get remainder operation, remainder should be the numeral in 0 to n-1, finally to remainder add-one operation, obtain the Stochastic choice coefficient i (i=1 under this time slot, 2, n), we utilize this Stochastic choice coefficient i (i=1, 2, n), under this time slot, select i-th group of Chaos Shift Keying Signals to communicate.
Especially, the present invention further improves, and it is characterized in that:
Described in described step 2, communication plan comprises:
1) chaos shift keying mode of operation 1 is with chaotic signal C1 and C2 representative digit signal 1 and 0 respectively,
2) chaos shift keying mode of operation 2 is with chaotic signal C2 and C3 representative digit signal 1 and 0 respectively,
3) chaos shift keying mode of operation i is with chaotic signal Ci and C (i+1) representative digit signal 1 and 0, wherein i=1,2 respectively ..., n-1,
4) chaos shift keying mode of operation n is with chaotic signal Cn and C1 representative digit signal 1 and 0 respectively;
The selection strategy of the mode of operation of the secure communication of described step 3 adopts simple order selection strategy mode of operation for you to choose successively, and carry out n system to timeslot number i and get remainder operation, remainder should be the numeral in 0 to n-1, finally to remainder add-one operation, obtain Stochastic choice coefficient i under this time slot (i=1,2 ... n), we utilize this Stochastic choice coefficient i (i=1,2 ... n), under this time slot, i-th group of Chaos Shift Keying Signals is selected to communicate.
Especially, the present invention further improves, and it is characterized in that:
Described in described step 2, communication plan comprises:
1) chaos shift keying mode of operation, adopts chaotic signal waveform CA and CB to represent digital signaling zero and 1;
2) chaotic mask mode of operation 1, adopts signal waveform S1 and S0 to represent digital signal 1 and 0, carries out chaotic mask respectively simultaneously with chaotic signal C1 to signal waveform S1 and S0;
3) chaotic mask mode of operation 0, adopts signal waveform S1 and S0 to represent digital signal 1 and 0, carries out chaotic mask respectively simultaneously with chaotic signal C0 to signal waveform S1 and S0;
The selection strategy of the mode of operation of the secure communication of described step 3 adopts simple order selection strategy mode of operation for you to choose successively, 3 systems are carried out to timeslot number i and gets remainder operation, remainder should be the numeral in 0 to 2, finally to remainder add-one operation, obtains the Stochastic choice coefficient i (i=1 under this time slot, 2,3), we utilize this Stochastic choice coefficient i (i=1,2,3), under this time slot, i-th group of Chaos Shift Keying Signals is selected to communicate.
Especially, the present invention further improves, and it is characterized in that:
The selection strategy of the mode of operation of the secure communication of described step 3 is employing chaos signal generator T0, each time slot carries out certain operations to the output of chaos signal generator T0, described certain operations can be summation, also can be convolution, or be directly sample quantization, operation result round numbers, then carry out 3 systems and get remainder operation, remainder should be the numeral in 0 to 2, finally to remainder add-one operation, obtain the Stochastic choice coefficient i (i=1 under this time slot, 2, 3), we utilize this Stochastic choice coefficient i (i=1, 2, 3), under this time slot, select i-th group of Chaos Shift Keying Signals to communicate.
Especially, the present invention further improves, and it is characterized in that:
Described in described step 2, communication plan comprises:
1) mode of operation 1, chaos shift keying mode, adopts chaotic signal waveform CB and CA to represent digital signal 1 and 0 respectively;
2) mode of operation 2, the 1st group of chaotic mask working method, adopt signal waveform S1 and S0 to represent digital signal 1 and 0, carry out chaotic mask to signal waveform S1 and S0 respectively with chaotic signal C0, condition of work meets S0+C0=CA simultaneously;
3) mode of operation 3, the 1st group of chaotic mask working method, adopt signal waveform S1 and S0 to represent digital signal 1 and 0, carry out chaotic mask to signal waveform S1 and S0 respectively with chaotic signal C1, condition of work meets S1+C1=CB simultaneously;
4) mode of operation 4, the 2nd group of chaotic mask working method, adopt signal waveform S3 and S2 to represent digital signal 1 and 0, carry out chaotic mask to signal waveform S1 and S0 respectively with chaotic signal C2, condition of work meets S2+C2=CA simultaneously;
5) mode of operation 5, the 2nd group of chaotic mask working method, adopt signal waveform S3 and S2 to represent digital signal 1 and 0, carry out chaotic mask to signal waveform S1 and S0 respectively with chaotic signal C3, condition of work meets S3+C3=CB simultaneously;
6) as described in Table 7, the like;
7) mode of operation 2n, n-th group of chaotic mask working method, signal waveform S (2n-1) and S (2n-2) is adopted to represent digital signal 1 and 0, use chaotic signal C (2n-2) to carry out chaotic mask to signal waveform S1 and S0 respectively, condition of work meets S (2n-2)+C (2n-2)=CA simultaneously;
8) mode of operation 2n, n-th group of chaotic mask working method, signal waveform S (2n-1) and S (2n-2) is adopted to represent digital signal 1 and 0, use chaotic signal C (2n-1) to carry out chaotic mask to signal waveform S1 and S0 respectively, condition of work meets S (2n-1)+C (2n-1)=CB simultaneously;
The selection strategy of the mode of operation of the secure communication of described step 3 adopts simple order selection strategy mode of operation for you to choose successively, 2n+1 system is carried out to timeslot number i and gets remainder operation, remainder should be the numeral in 0 to 2n, finally to remainder add-one operation, obtain the Stochastic choice coefficient i (i=1 under this time slot, 2,2n+1), we utilize this Stochastic choice coefficient i (i=1,2 ... 2n+1), under this time slot, i-th group of Chaos Shift Keying Signals is selected to communicate.
Especially, the present invention further improves, and it is characterized in that:
The selection strategy of the mode of operation of the secure communication of described step 3 is employing chaos signal generator T0, each time slot carries out certain operations to the output of chaos signal generator T0, described certain operations can be summation, also can be convolution, or be directly sample quantization, operation result round numbers, then carry out 2n system and get remainder operation, remainder should be the numeral in 0 to 2n, finally to remainder add-one operation, obtain the Stochastic choice coefficient i (i=1 under this time slot, 2, 2n+1), we utilize this Stochastic choice coefficient i (i=1, 2, 2n+1), under this time slot, select i-th group of Chaos Shift Keying Signals to communicate.
A kind of secret signalling of Development of Chaotic Secure Communication Method described above, it is characterized in that: comprise transmitting terminal subsystem and receiving terminal system, described transmitting terminal subsystem comprises: digital signal waveform generator, n chaotic signal waveform generator, transtation mission circuit, secure communication modulation circuit and secure communication controller A, described digital signal waveform generator and n chaotic signal waveform generator are electrically connected secure communication modulation circuit and secure communication controller A respectively, and described secure communication modulation circuit is electrically connected transtation mission circuit and secure communication controller A respectively;
Described receiving terminal system comprises: digital signal waveform generator, n chaotic signal waveform generator, receiving circuit, secure communication demodulator circuit and secure communication controller B, described digital signal waveform generator and n chaotic signal waveform generator are electrically connected secure communication demodulator circuit and secure communication controller B respectively, and described secure communication demodulator circuit is electrically connected receiving circuit and secure communication controller B respectively;
Described secure communication controller A and secure communication controller B keeps synchronous in communication process always.Especially, the present invention further improves, it is characterized in that: described secure communication controller A and secure communication controller B comprises identical device and annexation thereof respectively, namely high-frequency ring oscillator is comprised, sample quantization device, seed register, cellular automata, synchronous communication device and controller, described high-frequency ring oscillator, sample quantization device, the order electrical connection successively of seed register and cellular automata, described controller is electrically connected high-frequency generator respectively, sample quantization device, cellular automata and synchronous communication device, described controller is electrically connected digital signal waveform generator and n chaotic signal waveform generator respectively, described cellular automata feedback link high-frequency ring oscillator, the synchronous communication device of described secure communication controller A and the synchronous communication device of secure communication controller B keep wired or wireless connections.
Beneficial effect:
Relative to prior art, beneficial effect of the present invention is:
(1) under the prerequisite not increasing equipment cost, improve secure communication effect, cost is low, is easy to realize, and reliability is high;
(2) adopt cellular automata to generate Stochastic choice coefficient, randomness is strong, and reliability is high, maintains secrecy effective;
(3) adopt simple order selection strategy successively, do not adopt complicated random selection strategy, do not increase extra equipment cost, good secure communication effect can be reached equally;
(4) chaotic mask (CM) and chaos shift keying (CSK) are combined, security performance will improve greatly, and implement relatively simple, and practicality is high;
(5) the waveform CB that shows after adding chaotic mask C0 of S0 is consistent with the waveform CB in time slot 1, but digital waveform representative in time slot 1 and time slot 3 is on the contrary, and basic what adopt is that (time slot 1 is chaos shift keying to two kinds of different communication modes, time slot 3 is chaotic mask)
(6) in different time-gap, may show consistent before and after signal waveform, but the digital signal of its representative is on the contrary, and basic adopt be two kinds of different communication modes this disturb greatly decoding to bring to enemy and obscure, enemy can not be decoded in the short time, significantly increase the security performance of communication.
(7) there is method signal superposing the chaotic mask of macro-energy, can reuse, multiple stacking, secret better effects if
(8) need not be always synchronous;
(9) communication protocol is changed from main separation.
Accompanying drawing explanation
Fig. 1 secret signalling fundamental diagram.
Fig. 2 secure communication controller A/B.
Embodiment
Contrast accompanying drawing below, by the description to embodiment, the specific embodiment of the present invention is as the effect of the mutual alignment between the shape of involved each component, structure, each several part and annexation, each several part and operation principle, manufacturing process and operation using method etc., be described in further detail, have more complete, accurate and deep understanding to help those skilled in the art to inventive concept of the present invention, technical scheme.
Chaos shift keying utilizes different chaotic signal to represent binary message, if we only use 2 groups of chaotic signals (CA and CB) to represent in binary system 1 and 0, such as represents 1 with CA, represent 0 (as shown in table 1) with CB.So when the other side know that we adopts be chaos shift keying, what communication was decrypted may be 50%.That is because only have two kinds of chaotic signals in the air, be not 0 is exactly 1, and enemy utilizes supercomputer to be complete cracking work very possible within a short period of time.
Table 1
Digital signal 1 Digital signaling zero
Chaos Shift Keying Signals CA CB
Embodiment one:
Two kinds of chaotic signals are only had in the air for solving, be not 1 be exactly 0, the problem that enemy easily decodes, we propose a kind of chaos shift keying method of improvement, specifically, for not increasing system cost, remain 2 chaos signal generators, we select 2 groups of contrary chaos shift keying strategies to represent digital signal 1 and 0 (as shown in table 2), are then realized the selection of 2 groups of chaos shift keying strategies by a kind of simple selection strategy, thus realize the communication of more maintaining secrecy.
Table 2
Digital signal 1 Digital signaling zero
Chaos shift keying mode of operation 1 CA CB
Chaos shift keying mode of operation 2 CB CA
Although still only have two kinds of chaotic signals in the air, but because we adopt 2 kinds of antipodal strategies to communicate, for example, chaotic signal CA represents digital signal 1 for a moment, represent digital signaling zero for a moment, even if enemy can decode some data, but does not still obtain full detail, do not improving the confidentiality of high greatly communication in equipment cost.
The selection of described chaos shift keying strategy can be select successively in order, for increasing the randomness of selection strategy, increases secret effect.
Especially, we can adopt a chaos signal generator T0, and each time slot carries out certain operations to the output of chaos signal generator T0, and described certain operations can be summation, also can be convolution, or be directly sample quantization.Operation result round numbers, then carries out 2 systems and gets remainder operation, and remainder should be a numeral in 0 or 1, if remainder is 0, selects chaos shift keying strategy 1; If remainder is 1, select chaos shift keying strategy 2.Because we select chaos shift keying strategy based on the special computing of a chaos signal generator, because chaotic signal inherently has randomness, therefore, the effect of the secure communication that the program can make improves greatly.
Embodiment two:
Embodiment one can improve secure communication effect under the prerequisite not increasing equipment cost, but relative to equipment cost, secret effect is even more important.
Two kinds of chaotic signals are only had in the air for solving, still there is the possibility that use supercomputer carries out decoding in enemy, we propose a kind of chaos shift keying method of improvement, specifically, we select n group chaotic signal (corresponding n chaos shift keying mode of operation) to represent digital signal 1 and 0.
We can by a kind of simple selection strategy (such as, select successively in order, as shown in table 3.) n chaos shift keying mode of operation in table 3 is below selected, recipient and transmit leg are shaken hands in advance, reach common understanding, and carry out encoding and decoding according to same selection strategy, thus ensure that communication realizes smoothly.Enemy, owing to not knowing the selection strategy of n group Chaos Shift Keying Signals, for them, there will be 2n chaotic signal in the air, makes to decode difficulty and speed increase n times.
Table 3
In order to improve the effect of secure communication further, the simple in-order selection strategy that we can adopt a kind of random selection strategy to come in substitution list 3.Described random selection strategy be actually each slotted random provide a Stochastic choice coefficient i (i=1,2 ... n), i represents and chooses the n-th chaos shift keying mode of operation, that is to say, with CAi representative digit signal 1, with CBi representative digit signal 0.
Especially, we can adopt a chaos signal generator T0, and each time slot carries out certain operations to the output of chaos signal generator T0, and described certain operations can be summation, also can be convolution, or be directly sample quantization.Operation result round numbers, then carry out n system and get remainder operation, remainder should be the numeral in 0 to n-1, finally to remainder add-one operation, obtain Stochastic choice coefficient i under this time slot (i=1,2 ..., n).We utilize this Stochastic choice coefficient i (i=1,2 ..., n), under this time slot, select the n-th chaos shift keying mode of operation to communicate.
Especially, we also can adopt the cellular automata setting rule select Stochastic choice coefficient i under particular time-slot (i=1,2 ..., n).
Embodiment three:
Embodiment two to carry out selection strategy in order successively very simple, but always there will be two kinds of different chaotic signals in the air, it is binary digital signal that enemy's ratio is easier to identify, and naturally also just cracks than being easier to.Therefore embodiment two adds a random selection strategy, one that is used in Stochastic choice n chaos shift keying mode of operation, add decoding difficulty, but the also corresponding equipment cost increased, such as, if carry out the selection of randomized policy with chaos signal generator T0, a chaos signal generator must be increased.
In the present embodiment, we select n chaos signal generator, the chaotic signal that note produces is respectively C1, C2 ... Cn, adopt simple selection strategy sequentially successively also can obtain n group Chaos Shift Keying Signals for you to choose, as shown in table 4, complicated random selection strategy need not be adopted, also need not increase extra equipment cost, good secure communication effect can be reached equally.
Table 4
By in table 4, we find, due to the special setting of two adjacent groups Chaos Shift Keying Signals, after adopting simple selection strategy sequentially successively, in the often adjacent time cycle, only change a Chaos Shift Keying Signals, be left there is no the Chaos Shift Keying Signals of change then the digital signal representing Xiang Fa.Popular, for decoding Fang Eryan, a chaotic signal represents 0 for a moment and represents 1 for a moment, is difficult to grasp and decodes rule, therefore, the method simple possible, and secure communication is effective.
Embodiment one to three is all the digital communication that the chaos shift keying method utilized realizes maintaining secrecy, then chaos shift keying has an inevitable problem dare not how to improve exactly, essentially, chaos shift keying utilizes some limited chaotic signals to represent digital signal 1 and 0, once be chaos shift keying communication mode by what detect employing, if utilize supercomputer, be likely complete decoding at short notice.
Therefore, if can not allow enemy detect we adopt be chaos shift keying communication mode, that can increase secret effect greatly.
Embodiment four:
The general principle of chaotic mask is that the information that will transmit and chaos pseudo noise additivity are modulated, and reaches the object hidden information, belongs to analog communication.Chaos shift keying utilizes different chaotic signal to represent binary message, although belong to digital communication, because permutation and combination is very easily exhaustive, confidentiality is very low.But if chaotic mask (CM) and chaos shift keying (CSK) are combined, security performance will improve greatly, and implement relatively simple, practicality is high.
Chaos shift keying utilizes some limited chaotic signals to represent digital signal 1 and 0, once be chaos shift keying communication mode by what detect employing, security performance is just difficult to ensure.Detect chaos shift keying communication mode from prevention enemy to start with, we adopt following scheme.
First the transmitted power of communicating pair agreement chaos shift keying, be designated as P0, wireless channel has noise under normal circumstances, but in general noise can more than 10dB less of signal, and therefore recipient is easy to interference-free decoding.We change a thinking, adopt chaotic mask technology, select a powerful chaotic mask signal C00, its power is designated as PC00, ensure that the power of chaotic mask signal is greater than power 10 more than dB of chaos shift keying, that is, 10*lg (PC00/P0) >10dB.Like this, the signal of chaos shift keying can be regarded in noise takeover and powerful chaotic mask signal, although chaos shift keying has the difference of some signal waveforms to represent digital signal 1 and 0, but owing to being covered by chaotic signal, externally showing is irregular, mixed and disorderly chaotic signal, decoding is had no way of doing it, and security performance is very good.
Recipient knows the chaotic signal for chaotic mask in advance by the Handshake Protocol before intercommunication, as long as remove this chaotic mask signal at receiving terminal, then can obtain Chaos Shift Keying Signals with regard to very well, thus decoding obtains primary signal.
Especially, the method in embodiment four can be combined with each other with other embodiment, better effects if.
Embodiment five:
Further improvement, we select 2 special signal waveform S1 and S0, and select chaotic signal C1, C0, SA and SB that 4 special, satisfy condition S1+C1=SA, S0+C0=SB simultaneously.
As shown in table 5, we adopt three kinds of mode of operations of chaos shift keying and chaotic mask:
1) chaos shift keying mode of operation, we adopt chaotic signal waveform SA and SB to represent digital signaling zero and 1;
2) chaotic mask mode of operation 1, we adopt signal waveform S1 and S0 to represent digital signal 1 and 0, carry out chaotic mask respectively with chaotic signal C1 to signal waveform S1 and S0 simultaneously;
3) chaotic mask mode of operation 0, we adopt signal waveform S1 and S0 to represent digital signal 1 and 0, carry out chaotic mask respectively with chaotic signal C0 to signal waveform S1 and S0 simultaneously;
Table 5
Digital signal 1 Digital signaling zero
Chaos shift keying mode of operation CB CA Time slot 1
Chaotic mask mode of operation 1 S1+C1 S0+C1 Time slot 2
Chaotic mask mode of operation 0 S1+C0 S0+C0 Time slot 3
For the switching of 3 kinds of mode of operations, we select simple order selection strategy successively.Time slot 1, selects chaos shift keying mode of operation, uses chaotic signal CB and CA representative digit signal 1 and 0 respectively, time slot 2, select chaotic mask mode of operation 1, signal waveform S1 and S0 is representative digit signal 1 and 0 respectively, chaotic signal C1 is adopted to carry out chaotic mask to signal waveform, notice S1+C1=CA, and S1 now represents is digital signal 1, but the waveform CA that S1 shows after adding chaotic mask C1 is consistent with the waveform CA in time slot 1, but digital waveform representative in time slot 1 and time slot 2 is on the contrary, and basic what adopt is that (time slot 1 is chaos shift keying to two kinds of different communication modes, time slot 2 is chaotic mask), this disturbs greatly decoding to bring to enemy and obscures, enemy can not be decoded in the short time, significantly increase the security performance of communication.Same, in time slot 3, select chaotic mask mode of operation 0, signal waveform S1 and S0 is representative digit signal 1 and 0 respectively, chaotic signal C0 is adopted to carry out chaotic mask to signal waveform, notice S0+C0=CB, and S0 now represents is digital signaling zero, but the waveform CB that S0 shows after adding chaotic mask C0 is consistent with the waveform CB in time slot 1, but digital waveform representative in time slot 1 and time slot 3 is on the contrary, and basic what adopt is that (time slot 1 is chaos shift keying to two kinds of different communication modes, time slot 3 is chaotic mask), this disturbs greatly decoding to bring to enemy and obscures, enemy can not be decoded in the short time, significantly increase the security performance of communication.
Embodiment six:
The simple order that embodiment five is selected selects the strategy of mode of operation successively, and in order to increase the security performance of communication further, we can propose a kind of random selection strategy, by Stochastic choice coefficient i (i=1,2,3) mode of operation is selected, as shown in table 6.
Table 6
What described random selection strategy was actually each slotted random provides a Stochastic choice coefficient i (i=1,2,3), and i represents and chooses i-th kind of mode of operation, and such as, i=1 represents and selects chaos shift keying mode of operation; I=2 represents selection chaotic mask mode of operation 1; I=3 represents selection chaotic mask mode of operation 0.
Especially, we can adopt a chaos signal generator T0, and each time slot carries out certain operations to the output of chaos signal generator T0, and described certain operations can be summation, also can be convolution, or be directly sample quantization.Operation result round numbers, then carry out 3 systems and get remainder operation, remainder should be the numeral in 0 to 2, finally to remainder add-one operation, obtains the Stochastic choice coefficient i (i=1,2,3) under this time slot.We utilize this Stochastic choice coefficient i (i=1,2,3), select i-th kind of mode of operation to communicate under this time slot.
Especially, the Stochastic choice coefficient i (i=1,2,3) under we also can adopt the cellular automata setting rule to select particular time-slot.
Embodiment seven:
The mixing of what embodiment five and embodiment six adopted is a kind of chaos shift keying mode of operation and two kinds of chaotic mask mode of operations, can obtain extraordinary secret effect when equipment cost is controlled.
Further improve, in order to improve the effect of secure communication further, we can provide a kind of chaos shift keying mode of operation and 2n kind chaotic mask mode of operation, amount to 2n+1 kind mode of operation, utilize simple selection strategy sequentially successively to carry out the selection of mode of operation.Wherein under chaos shift keying mode of operation
As shown in table 7.
Table 7
For the switching of 2n+1 kind mode of operation in table 7, we can select simple order selection strategy successively.Time slot 1, selects mode of operation 1, chaos shift keying mode, uses chaotic signal CB and CA representative digit signal 1 and 0 respectively;
What time slot 2 and time slot 3 were selected is the 1st group of chaotic mask working method, wherein, time slot 2 selects mode of operation 1, chaotic mask signal waveform S1 and S0 is representative digit signal 1 and 0 respectively, chaotic signal C0 is adopted to carry out chaotic mask to signal waveform, notice S0+C0=CA, and S1 now represents is digital signal 1, but the waveform CA that S1 shows after adding chaotic mask C0 is consistent with the waveform CA in time slot 1, but digital waveform representative in time slot 1 and time slot 2 is on the contrary, and basic what adopt is that (time slot 1 is chaos shift keying to two kinds of different communication modes, time slot 2 is chaotic mask), this disturbs greatly decoding to bring to enemy and obscures, enemy can not be decoded in the short time, significantly increase the security performance of communication,
Same, in time slot 3, time slot 2 selects mode of operation 3, signal waveform S1 and S0 is representative digit signal 1 and 0 respectively, chaotic signal C1 is adopted to carry out chaotic mask to signal waveform, notice S1+C1=CB, and S1 now represents is digital signal 1, but the waveform CB that S1 shows after adding chaotic mask C1 is consistent with the waveform CB in time slot 1, but digital waveform representative in time slot 1 and time slot 3 is on the contrary, and basic what adopt is that (time slot 1 is chaos shift keying to two kinds of different communication modes, time slot 3 is chaotic mask), this disturbs greatly decoding to bring to enemy and obscures, enemy can not be decoded in the short time, significantly increase the security performance of communication.
In like manner, as shown in table 7, what time slot 4 and time slot 5 were selected is the 2nd group of chaotic mask working method, the like, what time slot 2n and time slot 2n+1 selected is n-th group of chaotic mask working method, adopt the working method of this large-scale chaotic mask and chaos shift keying mixing, the mixing of a kind of in fact analog communication and digital communication, although take simple order selection strategy successively, but decoding side has no way of learning, and the complexity decoded increases along with the increase exponentially level of n, has splendid secure communication effect.
Embodiment eight:
The simple order that embodiment seven is selected selects the strategy of mode of operation successively, and in order to increase the security performance of communication further, we can propose a kind of random selection strategy, by Stochastic choice coefficient i (i=1,2 ... 2n+1) select mode of operation, as shown in table 8.
Table 8
Digital signal 1 Digital signaling zero Chaotic mask signal Mode of operation is selected
Mode of operation 1 CB CA i=1
Mode of operation 2 S1 S0 C0 i=2
Mode of operation 3 S1 S0 C1 i=3
Mode of operation 4 S2 S3 C2 i=4
Mode of operation 5 S2 S3 C3 i=5
Mode of operation 2n S(2n-1) S(2n-2) C(2n-2) i=2n
Mode of operation 2n+1 S(2n-1) S(2n-2) C(2n-1) i=2n+1
Described random selection strategy be actually each slotted random provide a Stochastic choice coefficient i (i=1,2 ..., 2n+1), i represents and chooses i-th kind of mode of operation, and such as, i=1 represents and selects mode of operation 1; I=2 represents selection mode of operation 2; I=2n+1 represents selection mode of operation 2n+1.
Especially, we can adopt a chaos signal generator T0, and each time slot carries out certain operations to the output of chaos signal generator T0, and described certain operations can be summation, also can be convolution, or be directly sample quantization.Operation result round numbers, then carry out 2n+1 system and get remainder operation, remainder should be the numeral in 0 to 2n, finally to remainder add-one operation, obtain Stochastic choice coefficient i under this time slot (i=1,2 ..., 2n+1).We utilize this Stochastic choice coefficient i (i=1,2 ..., 2n+1), under this time slot, select i-th kind of mode of operation to communicate.
Especially, we also can adopt the cellular automata setting rule select Stochastic choice coefficient i under particular time-slot (i=1,2 ..., 2n+1).
Embodiment nine:
Embodiment four to embodiment eight is all the used in combination of chaotic mask and chaos shift keying, in order to improve the effect of secure communication further, we again can superpose the chaotic mask of macro-energy in final signal waveform of launching, thus real signal waveform is gone as in the chaotic signal being buried in macro-energy, allow decoding side have no way of doing it.
Especially, there is method signal superposing the chaotic mask of macro-energy, can reuse, multiple stacking, better effects if.
Embodiment ten:
In addition, in order to realize the secret communication method of above-mentioned nine embodiments, we devise a kind of secret signalling.
A kind of secret signalling, comprise transmitting terminal subsystem and receiving terminal system, described transmitting terminal subsystem comprises: digital signal waveform generator, n chaotic signal waveform generator, transtation mission circuit, secure communication modulation circuit and secure communication controller A, described digital signal waveform generator and n chaotic signal waveform generator are electrically connected secure communication modulation circuit and secure communication controller A respectively, and described secure communication modulation circuit is electrically connected transtation mission circuit and secure communication controller A respectively;
Described receiving terminal system comprises: digital signal waveform generator, n chaotic signal waveform generator, receiving circuit, secure communication demodulator circuit and secure communication controller B, described digital signal waveform generator and n chaotic signal waveform generator are electrically connected secure communication demodulator circuit and secure communication controller B respectively, and described secure communication demodulator circuit is electrically connected receiving circuit and secure communication controller B respectively;
Described secure communication controller A and secure communication controller B keeps synchronous in communication process always.
The concrete communication process of secret signalling is as follows:
Before transmitting, transmitting terminal and receiving terminal determine communication protocol and random selection strategy by shaking hands, and in communication process, secure communication controller A and secure communication controller B keeps synchronous in communication process always.
At transmitting terminal, first source signal enters secure communication controller A, utilize the random selection strategy that determines in advance to select mode of operation, secure communication controller A controls the digital signal waveform generator of transmitting terminal subsystem, a n chaotic signal waveform generator and secure communication modulation circuit according to mode of operation.Specifically, secure communication controller A comes according to mode of operation and then sends control signal, the signal output waveform of control figure signal waveform generator and n chaotic signal waveform generator, control the parameter configuration of secure communication modulation circuit simultaneously, under the common cooperation of the digital signal waveform generator of transmitting terminal subsystem, a n chaotic signal waveform generator and secure communication modulation circuit, final secure communication modulation circuit exports the modulation signal under specific operation mode, sends for transtation mission circuit.
At receiving terminal, receiving circuit exports to secure communication demodulator circuit after receiving modulation signal, because secure communication controller A and secure communication controller B keeps synchronous in communication process always, so secure communication controller B knows mode of operation selected by transmitting terminal and corresponding parameter configuration very much, secure communication controller B sends control signal to the digital signal waveform generator of receiving terminal system, n chaotic signal waveform generator, receiving circuit and secure communication demodulator circuit, the digital signal waveform generator of receiving terminal system, n chaotic signal waveform generator, receiving circuit and secure communication demodulator circuit three co-ordination carry out demodulation to signal, final secure communication demodulator circuit exports restituted signal.
Embodiment 11:
In embodiment ten, before transmitting, transmitting terminal and receiving terminal determine communication protocol and random selection strategy by shaking hands, and in communication process, secure communication controller A and secure communication controller B keeps synchronous in communication process always.
Because need secure communication controller A and secure communication controller B always to keep synchronous regime in communication process in communication process always, add communications cost on the one hand, on the other hand owing to there being the existence of synchronous communication signal always, also increase the possibility of decoding.For these two shortcomings, we have following improvement project.
Especially, described secure communication controller A and secure communication controller B comprises identical device and annexation thereof respectively, namely high-frequency ring oscillator is comprised, sample quantization device, seed register, cellular automata, synchronous communication device and controller, described high-frequency ring oscillator, sample quantization device, the order electrical connection successively of seed register and cellular automata, described controller is electrically connected high-frequency generator respectively, sample quantization device, cellular automata and synchronous communication device, described controller is electrically connected digital signal waveform generator and n chaotic signal waveform generator respectively, described cellular automata feedback link high-frequency ring oscillator, the synchronous communication device of described secure communication controller A and the synchronous communication device of secure communication controller B keep wired or wireless connections.
Specific works flow process is as follows:
First, transmitting terminal and receiving terminal determine communication protocol and random selection strategy by shaking hands, and in communication process, the synchronous communication device of secure communication controller A sends out a synchronous control signal to the communicator of secure communication controller B.Because this secure communication is only start to be carry out shaking hands and exchanging synchronous control signal in communication, not be used in communication process swap data repeatedly, both saved communications cost, and turn improved secure communication effect.
The controller initialization cellular automata of transmitting terminal, control high-frequency ring oscillator and sampler generate random number seed and are stored in random number seed register simultaneously, random number seed sends to cellular automata as initial condition by random number seed register, and cellular automata generates random number in order to determine selecting which kind of mode of operation according to respective rule and initial condition.
The random number seed that the first receiving end/sending end of receiving terminal produces, then be stored in random number seed register, random number seed sends to the cellular automata of transmitting terminal as initial condition by random number seed register, and the cellular automata of transmitting terminal generates random number in order to determine selecting which kind of mode of operation according to respective rule and initial condition.
Because transmitting terminal is identical with the rule of the cellular automata of receiving terminal, random number seed is also identical, and therefore, the cellular automata of transmitting terminal is identical in order to the mode of operation determined with initial condition generation random number according to respective rule, can realize decoding smoothly.
Especially, in order to increase secure communication effect further, transmitting terminal and receiving terminal independently can change the agreement of secure communication at any time, specifically, high-frequency ring oscillator is made to produce new random number seed as long as transmitting terminal and receiving terminal initiatively send control signal, and then new random number seed being sent to the other side by synchronous communication device, subsequent time, transmitting terminal and receiving terminal make cellular automata select mode of operation according to new random number seed.
Above by reference to the accompanying drawings to invention has been exemplary description; obvious specific implementation of the present invention is not subject to the restrictions described above; as long as have employed the improvement of the various unsubstantialities that method of the present invention is conceived and technical scheme is carried out; or design of the present invention and technical scheme directly applied to other occasion, all within protection scope of the present invention without to improve.

Claims (10)

1. a Development of Chaotic Secure Communication Method, is characterized in that, the method step comprises:
The transmitting terminal of step one, chaotic secret communication system and receiving terminal first time shake hands, and determine communication protocol, previously arranged signal power is P0;
The transmitting terminal of step 2, chaotic secret communication system and receiving terminal second handshake, determine the mode of operation of transmitting terminal and receiving terminal secure communication;
The transmitting terminal of step 3, chaotic secret communication system and receiving terminal third time shake hands, and determine the selection strategy of the mode of operation of transmitting terminal and receiving terminal secure communication;
Communication protocol, mode of operation and selection strategy that step 4, transmitting terminal are determined according to three-way handshake carry out scrambling coding to source signal, obtain scrambling coding signal;
Step 5, transmitting terminal adopt chaotic mask technology, select a powerful chaotic mask signal C00, its power is designated as PC00, ensure that the power of chaotic mask signal is greater than power 10 more than dB of chaos shift keying, namely, 10*lg (PC00/P0) >10dB, is then sent to receiving terminal by the radio-frequency apparatus of transmitting terminal;
Step 6, receiving terminal know the chaotic signal C00 for chaotic mask in advance by the Handshake Protocol before intercommunication, first this chaotic mask signal C00 is removed, then communication protocol, mode of operation and the selection strategy determined according to three-way handshake carry out reverse sync operation, the waveform of decoded security code signal, obtains the estimated signal of source signal.
2. Development of Chaotic Secure Communication Method according to claim 1, is characterized in that:
The mode of operation of described step 2 comprises:
1) chaos shift keying mode of operation 1 is with chaotic signal CA and CB representative digit signal 1 and 0 respectively,
2) chaos shift keying mode of operation 2 is with chaotic signal CA and CB representative digit signal 0 and 1 respectively;
The selection strategy of the mode of operation of the secure communication of described step 3 is employing chaos signal generator T0, each time slot carries out certain operations to the output of chaos signal generator T0, described certain operations can be summation, also can be convolution, or be directly sample quantization, operation result round numbers, then carry out 2 systems and get remainder operation, remainder should be a numeral in 0 or 1, if remainder is 0, select chaos shift keying mode of operation 1 to communicate, if remainder is 1, select chaos shift keying mode of operation 2 to communicate.
3. Development of Chaotic Secure Communication Method according to claim 1, is characterized in that:
Described in described step 2, communication plan comprises:
1) chaos shift keying mode of operation 1 is with chaotic signal CA1 and CB2 representative digit signal 1 and 0 respectively,
2) chaos shift keying mode of operation 2 is with chaotic signal CA2 and CB2 representative digit signal 1 and 0 respectively,
3) chaos shift keying mode of operation i is with chaotic signal CAi and CBi representative digit signal 1 and 0, wherein i=1,2 respectively ..., n;
The selection strategy of the mode of operation of the secure communication of described step 3 is employing chaos signal generator T0, each time slot carries out certain operations to the output of chaos signal generator T0, described certain operations can be summation, also can be convolution, or be directly sample quantization, operation result round numbers, then carry out n system and get remainder operation, remainder should be the numeral in 0 to n-1, finally to remainder add-one operation, obtain the Stochastic choice coefficient i (i=1 under this time slot, 2, n), we utilize this Stochastic choice coefficient i (i=1, 2, n), under this time slot, select i-th group of Chaos Shift Keying Signals to communicate.
4. Development of Chaotic Secure Communication Method according to claim 1, is characterized in that:
Described in described step 2, communication plan comprises:
1) chaos shift keying mode of operation 1 is with chaotic signal C1 and C2 representative digit signal 1 and 0 respectively,
2) chaos shift keying mode of operation 2 is with chaotic signal C2 and C3 representative digit signal 1 and 0 respectively,
3) chaos shift keying mode of operation i is with chaotic signal Ci and C (i+1) representative digit signal 1 and 0, wherein i=1,2 respectively ..., n-1,
4) chaos shift keying mode of operation n is with chaotic signal Cn and C1 representative digit signal 1 and 0 respectively;
The selection strategy of the mode of operation of the secure communication of described step 3 adopts simple order selection strategy mode of operation for you to choose successively, and carry out n system to timeslot number i and get remainder operation, remainder should be the numeral in 0 to n-1, finally to remainder add-one operation, obtain Stochastic choice coefficient i under this time slot (i=1,2 ... n), we utilize this Stochastic choice coefficient i (i=1,2 ... n), under this time slot, i-th group of Chaos Shift Keying Signals is selected to communicate.
5. Development of Chaotic Secure Communication Method according to claim 1, is characterized in that:
Described in described step 2, communication plan comprises:
1) chaos shift keying mode of operation, adopts chaotic signal waveform CA and CB to represent digital signaling zero and 1;
2) chaotic mask mode of operation 1, adopts signal waveform S1 and S0 to represent digital signal 1 and 0, carries out chaotic mask respectively simultaneously, meet S1+C1=CA with chaotic signal C1 to signal waveform S1 and S0;
3) chaotic mask mode of operation 0, adopts signal waveform S1 and S0 to represent digital signal 1 and 0, carries out chaotic mask respectively simultaneously, meet S0+C0=CB with chaotic signal C0 to signal waveform S1 and S0;
The selection strategy of the mode of operation of the secure communication of described step 3 adopts simple order selection strategy mode of operation for you to choose successively, 3 systems are carried out to timeslot number i and gets remainder operation, remainder should be the numeral in 0 to 2, finally to remainder add-one operation, obtains the Stochastic choice coefficient i (i=1 under this time slot, 2,3), we utilize this Stochastic choice coefficient i (i=1,2,3), under this time slot, i-th group of Chaos Shift Keying Signals is selected to communicate.
6. Development of Chaotic Secure Communication Method according to claim 5, is characterized in that:
The selection strategy of the mode of operation of the secure communication of described step 3 is employing chaos signal generator T0, each time slot carries out certain operations to the output of chaos signal generator T0, described certain operations can be summation, also can be convolution, or be directly sample quantization, operation result round numbers, then carry out 3 systems and get remainder operation, remainder should be the numeral in 0 to 2, finally to remainder add-one operation, obtain the Stochastic choice coefficient i (i=1 under this time slot, 2, 3), we utilize this Stochastic choice coefficient i (i=1, 2, 3), under this time slot, select i-th group of Chaos Shift Keying Signals to communicate.
7. Development of Chaotic Secure Communication Method according to claim 1, is characterized in that:
Described in described step 2, communication plan comprises:
1) mode of operation 1, chaos shift keying mode, adopts chaotic signal waveform CB and CA to represent digital signal 1 and 0 respectively;
2) mode of operation 2, the 1st group of chaotic mask working method, adopt signal waveform S1 and S0 to represent digital signal 1 and 0, carry out chaotic mask to signal waveform S1 and S0 respectively with chaotic signal C0, condition of work meets S0+C0=CA simultaneously;
3) mode of operation 3, the 1st group of chaotic mask working method, adopt signal waveform S1 and S0 to represent digital signal 1 and 0, carry out chaotic mask to signal waveform S1 and S0 respectively with chaotic signal C1, condition of work meets S1+C1=CB simultaneously;
4) mode of operation 4, the 2nd group of chaotic mask working method, adopt signal waveform S3 and S2 to represent digital signal 1 and 0, carry out chaotic mask to signal waveform S1 and S0 respectively with chaotic signal C2, condition of work meets S2+C2=CA simultaneously;
5) mode of operation 5, the 2nd group of chaotic mask working method, adopt signal waveform S3 and S2 to represent digital signal 1 and 0, carry out chaotic mask to signal waveform S1 and S0 respectively with chaotic signal C3, condition of work meets S3+C3=CB simultaneously;
6) as described in Table 7, the like;
7) mode of operation 2n, n-th group of chaotic mask working method, signal waveform S (2n-1) and S (2n-2) is adopted to represent digital signal 1 and 0, use chaotic signal C (2n-2) to carry out chaotic mask to signal waveform S1 and S0 respectively, condition of work meets S (2n-2)+C (2n-2)=CA simultaneously;
8) mode of operation 2n, n-th group of chaotic mask working method, signal waveform S (2n-1) and S (2n-2) is adopted to represent digital signal 1 and 0, use chaotic signal C (2n-1) to carry out chaotic mask to signal waveform S1 and S0 respectively, condition of work meets S (2n-1)+C (2n-1)=CB simultaneously;
The selection strategy of the mode of operation of the secure communication of described step 3 adopts simple order selection strategy mode of operation for you to choose successively, 2n+1 system is carried out to timeslot number i and gets remainder operation, remainder should be the numeral in 0 to 2n, finally to remainder add-one operation, obtain the Stochastic choice coefficient i (i=1 under this time slot, 2,2n+1), we utilize this Stochastic choice coefficient i (i=1,2 ... 2n+1), under this time slot, i-th group of Chaos Shift Keying Signals is selected to communicate.
8. Development of Chaotic Secure Communication Method according to claim 7, is characterized in that:
The selection strategy of the mode of operation of the secure communication of described step 3 is employing chaos signal generator T0, each time slot carries out certain operations to the output of chaos signal generator T0, described certain operations can be summation, also can be convolution, or be directly sample quantization, operation result round numbers, then carry out 2n system and get remainder operation, remainder should be the numeral in 0 to 2n, finally to remainder add-one operation, obtain the Stochastic choice coefficient i (i=1 under this time slot, 2, 2n+1), we utilize this Stochastic choice coefficient i (i=1, 2, 2n+1), under this time slot, select i-th group of Chaos Shift Keying Signals to communicate.
9. realize a secret signalling for the Development of Chaotic Secure Communication Method described in claim 1-8 any one, it is characterized in that: comprise transmitting terminal subsystem and receiving terminal system:
Described transmitting terminal subsystem comprises: digital signal waveform generator, n chaotic signal waveform generator, transtation mission circuit, secure communication modulation circuit and secure communication controller A, described digital signal waveform generator and n chaotic signal waveform generator are electrically connected secure communication modulation circuit and secure communication controller A respectively, and described secure communication modulation circuit is electrically connected transtation mission circuit and secure communication controller A respectively;
Described receiving terminal system comprises: digital signal waveform generator, n chaotic signal waveform generator, receiving circuit, secure communication demodulator circuit and secure communication controller B, described digital signal waveform generator and n chaotic signal waveform generator are electrically connected secure communication demodulator circuit and secure communication controller B respectively, and described secure communication demodulator circuit is electrically connected receiving circuit and secure communication controller B respectively;
Described secure communication controller A and secure communication controller B keeps synchronous in communication process always.
10. secret signalling according to claim 9, it is characterized in that: described secure communication controller A and secure communication controller B comprises identical device and annexation thereof respectively, namely high-frequency ring oscillator is comprised, sample quantization device, seed register, cellular automata, synchronous communication device and controller, described high-frequency ring oscillator, sample quantization device, the order electrical connection successively of seed register and cellular automata, described controller is electrically connected high-frequency generator respectively, sample quantization device, cellular automata and synchronous communication device, described controller is electrically connected secure communication modulation circuit respectively, digital signal waveform generator and n chaotic signal waveform generator, described cellular automata feedback link high-frequency ring oscillator, the synchronous communication device of described secure communication controller A and the synchronous communication device of secure communication controller B keep wired or wireless connections.
CN201610073928.1A 2016-01-29 2016-01-29 A kind of Development of Chaotic Secure Communication Method and secret signalling Expired - Fee Related CN105553641B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610073928.1A CN105553641B (en) 2016-01-29 2016-01-29 A kind of Development of Chaotic Secure Communication Method and secret signalling

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610073928.1A CN105553641B (en) 2016-01-29 2016-01-29 A kind of Development of Chaotic Secure Communication Method and secret signalling

Publications (2)

Publication Number Publication Date
CN105553641A true CN105553641A (en) 2016-05-04
CN105553641B CN105553641B (en) 2018-12-04

Family

ID=55832588

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610073928.1A Expired - Fee Related CN105553641B (en) 2016-01-29 2016-01-29 A kind of Development of Chaotic Secure Communication Method and secret signalling

Country Status (1)

Country Link
CN (1) CN105553641B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106301757A (en) * 2016-08-25 2017-01-04 王波 A kind of chaotic secret communication system
CN114004682A (en) * 2021-12-31 2022-02-01 南京都昌信息科技有限公司 Data processing method and device based on editor and ca signature

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101515228A (en) * 2009-02-13 2009-08-26 华中科技大学 True random number generator
CN102651655A (en) * 2011-02-24 2012-08-29 北京化工大学 Realization method of fast frequency hopping communication

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101515228A (en) * 2009-02-13 2009-08-26 华中科技大学 True random number generator
CN102651655A (en) * 2011-02-24 2012-08-29 北京化工大学 Realization method of fast frequency hopping communication

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
董学洋: "基于混沌算法的视频加密传输系统的研究", 《中国优秀硕士学位论文全文数据库信息科技辑》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106301757A (en) * 2016-08-25 2017-01-04 王波 A kind of chaotic secret communication system
CN114004682A (en) * 2021-12-31 2022-02-01 南京都昌信息科技有限公司 Data processing method and device based on editor and ca signature

Also Published As

Publication number Publication date
CN105553641B (en) 2018-12-04

Similar Documents

Publication Publication Date Title
JP3778969B2 (en) Method and apparatus for spread spectrum code pulse position modulation
Boudreau et al. A comparison of trellis coded versus convolutionally coded spread-spectrum multiple-access systems
CN103944606B (en) A kind of production method of AFH pattern
CN104853339A (en) Signal processing method and device
Liu et al. A secure and robust frequency and time diversity aided OFDM–DCSK modulation system not requiring channel state information
CN105187347B (en) Polynary orthogonal chaos shift keying modulation demodulation method
CN109155767B (en) Wireless communication device, transmitter and method therein
WO2020047984A1 (en) Multiple repeated phase shift code shift keying modulation method and demodulation method therefor
CN110430027B (en) Data transmission method, transmitting terminal device and storage medium
CN105553641A (en) Chaotic secure communication method and secure communication system
WO2019154286A1 (en) Data modulation and demodulation method and apparatus
Suryana et al. Implementation of Link-16 based tactical data link system using software-defined radio
US20200351019A1 (en) Methods and computing device for facilitating multiple access in a wireless communication network
CN102208975B (en) Signal encoding/encryption transmission method
CN108306707A (en) A kind of method, apparatus and communication system of multiple access access
Zhang et al. Design and Performance Analysis of Multilevel Code-Shifted $ M $-Ary Differential Chaos Shift Keying System
Zhu et al. DPI DCSK modulation with BCJR decoding
CN105281861A (en) Multisystem modulation code block and modulation code generation method
WO2020162856A1 (en) Application of key exchange based physical layer security methods
Zhang et al. A novel QAM-DCSK secure communication system
JP2010028668A (en) Spreading code calculation device, communicating system, transmitter, receiver, and program
CN103647737B (en) The time hopping modulation implementation method of MPPSK modulation
Ullah et al. Design and construction of direct sequence spread spectrum CDMA transmitter and receiver
He et al. Modulation domain encrypted transmission based on chaotic sequence for satellite communication
Hossain Spectrum-Efficient High-Density Data Communication for Wireless Sensor Networks

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20181204

Termination date: 20190129